Spam Protection

Spam protection can only be done right when you take into account the nuances of a particular business, the features of the corporate network and existing software solutions – not just the degree of protection you need. WellStoneSupport will help you install, properly configure and integrate the selected solution with the existing elements of information security systems.

Before reaching the user’s computer, most email spam and viruses can be neutralized with Internet gateway protection. Carefully selected and configured gateway protection software can detect and automatically delete malicious and potentially dangerous programs from the data stream that enters the corporate network via HTTP, FTP, and SMTP.

With the right setup, anti-spam software currently available on the market will deal with most junk mail, dramatically reducing the volume of incoming traffic and the time lost in reviewing and deleting it. Solutions from leading vendors include proactive protection, ongoing virus database updates, extensive administration capabilities, and unified security policies adapted to mobile devices and cloud environments. In addition to protecting against direct threats, they can detect data loss, track performance degradation and corporate security breaches. WellStoneSupport knows which products work best in the given environment, and we can get your corporate communications immune to spam in a matter of days.

Our expertise

Basics

Filtering incoming traffic from spam or malicious attachments;

Sender address spoofing prevention (Sender Policy Framework, SPF); DomainKeys Identified Mail (DKIM); DomainKeys Identified Mail (DKIM);

Controlling the actions of privileged users (both employees and external contractors);

Organization of content filtering.

Maintenance

Audit of customers' mail servers configuration with recommendations for optimal protection;

Configuring mail servers so that they provide the required performance and fault tolerance while continuously monitoring their operation;

Creation of corporate mail security regulations;

Email safety employee training and seminars;

Advanced Services

Integration of an additional firewall or specialized Email Security Appliance;

Control of corporate email access, assigning user privileges to mail and other collateral servers;

Integration of SSL encryption to protect intercepted emails, rendering their contents unreadable;

PGP solutions for digital signatures implemented as browser plugins and email clients.

FAQ

How does your spam recognition and filtering work?
Our module uses spam signatures and heuristic rules to assign spam score depending on the degree to which the message matches the spam pattern. If the score exceeds the diagnostic level, the program takes an anti-spam action.
Is there a risk of false positives in your spam module?
To detect spam and viruses, the products we use rely on big data derived from billions of emails received by spam centers (honey pots) distributed all over the world for this purpose. This approach ensures almost zero false positives.
Is a signature system necessary for spam protection?
You’d better have one. By this signature the recipient's server can determine that the sender's address is forged and the letter itself has not undergone changes in the process of transmission.
Can you set up a spam filter based on proxy servers?
Sure. When using proxies, the servers will intercept SMTP even if the destination IP address is different from that of the mail server. The email is scanned for viruses and spam and then sent to the end recipient.